hw4
.pdf
keyboard_arrow_up
School
San Jose State University *
*We aren’t endorsed by this school
Course
166
Subject
Computer Science
Date
Apr 3, 2024
Type
Pages
1
Uploaded by klb2832
CS-166 Information Security Homework #4 Due: 12/7/2022, Wednesday, 11:59pm Except for the programming, please describe your answers in less than 10 sentences. Highlight your key points for each question. Please upload your soft copy (reports, codes) on the CANVAS by the due date. Please consult with your partners in your study or project group to solve homework assignments. However, note that you must write up your report yourself without any assistance. If you turn in the exact same report and same code as your friend, both of you will receive 0 points and be considered violating academic integrity. This homework covers Network Attacks. There is an accompanying lab document “
CS166 Scapy-based Network Att
acks” that you need to refer to the lab exercise tasks.
Total points 60 [Question 1] (20 points) TCP SYN Flooding Attacks (1) Explanation how the TCP SYN flood attack works. (2) Explanation how SYN cookies work to prevent denial-of-service effect from SYN flood attack. (3) Follow the lab document to launch TCP SYN flooding attacks by using Scapy. Explain the “tcp_syn.py” code by commenting each line. You need to show captured attack traffic by using Wireshark (or other packet capturing tools.). Basically, you need to follow the attached Scapy lab docs. [Question 2] (20 points) UPD Flooding Attacks (1) Explanation how the UPD attack works. (2) Follow the lab document to launch UDP flooding attacks by using Scapy. Explain the “
udp_flood
.py” code by commenting each line. You need to show captured attack traffic by using Wireshark (or other packet capturing tools.). Basically, you need to follow the attached Scapy lab docs. [Question 3] (20 points) ICMP Flooding Attacks (1) Explanation how the ICMP attack works. (2) Follow the lab document to launch ICMP flooding attacks by using Scapy. Explain the “icmp_flood.py” code by commenting each line. You need to show captured attack traffic by using Wireshark (or other packet capturing tools.). Basically, you need to follow the attached Scapy lab docs.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are
encouraged) in PDF format through Blackboard using the following file name format:
LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten.
All the assignments in this course are individual work; any overlap between assignment reports will be
penalized.
A bank requires for their customers to access their online banking accounts to provide as
User Id (or user name) the last 8 digits of their bank card number, and a password with a
length between 8 and 12 ASCII characters, including the following restrictions (posted on
their website):
Passwords must have at least 8 characters long and at most 12 characters long, and must include at least
one character from each of the following four character types:
Upper case letters ABC DEF
Lower case letters ghijkl
Numbers 1 2 345 67890
Special characters ! @ # $ % ^ & * (+) = -
The remaining characters of the password must be selected…
arrow_forward
Approved
Yos
Priority
No
RESERVED FOR USE BY APPROVING AUTHORITY
Reference to S0SS/PEWG sion
the form.
Signature
20. Conside: Figure 2, it is part of a change request form. Discuss the purpose of th
arrow_forward
write access model Only Leena can access her laptop. The website can be accessed only during work time The file is a read-only file. Only course instructors can access students' data.
arrow_forward
Create a database table that includes at least 12 columns
Use VBA tools to create a user form the form should be user friendly and interact with at least three other forms, It should allow the user to add a new complete information to the database and edit a current information available in the database. The user should be restricted to add any duplicated informatio
arrow_forward
Copyright notice: This question is part of a graded exam and cannot be redistributed in any form or fashion. ID: 10-52-01-
5012. This copyright notice does not impact the contents of the question or answer choices. Hosting this question on any
website or service constitutes as an academic integrity violation and is an infringement of copyright.
Selena Gomezz has ventured into e-commerce and her website has a lot of products - so many that
her employees are having a hard time learning about all of the products that they sell which has led
to some struggles with providing excellent customer service. What would you recommend to Selena
to help with this issue? Choose the best answer from the options that are available below.
O Cloud based enterprise system
Customer relationship management system
Knowledge management system
None of the options are correct
O Supply chain management system
0.2 pts
Question 40
Copyright notice: This question is part of a graded exam and cannot be redistributed…
arrow_forward
Indicate the changes you need to make to the KimTay Pet Supplies database to support the following additional requirement. Each location has a manager who is identified by a manager ID, a manager first name, and a manager last
name.
arrow_forward
Font
Paragraph
Styles
Editing
Dictate
Editor
Reuse
aste
Files
Styles
Voice
Sensitivity
Editor
Reuse Files
oboard
You have just been hired as a consultant for a big Health Care provider. Impressed by your
background in databases, they want you to completely redesign their database system.
Talking with the people at the HC provider, you get the following information (be very
careful on some of these attributes, and apply everything you have learned to this
point:
- The database contains information about patients, hospitals and doctors.
- Each patient has an ID, first name, last name, address and age. A patient is
uniquely identified by his or her ID.
- Each hospital has an id, name and budget. The id uniquely identifies a hospital.
- Each doctor an id, a full name, email address and a favorite movie. The id
uniquely identifies a doctor.
- Each patient can be treated at many hospitals, a hospital can treat many patients.
Each doctor can work at only one hospital. A hospital can have many…
arrow_forward
In four to five sentences, Discuss CYBERSEX.
Note: [Please refrain from copying on Google, most bartleby Expert copied their answer on Google]
arrow_forward
Please define the terms "integrity" and "authorization."
arrow_forward
List data excluded from the Security Rule.
arrow_forward
Workers:
Name
Worker ID
Department
Job Title
Basic Salary
Age
Date of Birth
Passport Details
The system should store details of each worker including their personal information, job-related details, and passport information for identification purposes.
Parties:
Party ID
Type
Theme
Date
Time
Duration
Venue Address
Client ID
Guest List
Catering Company
Cleaning Company
Decorations Company
Entertainment Company
Furniture Supply Company
Invoice
Each party should have a unique identifier along with details such as type, theme, date, time, and duration. It should also track the venue address, client details, guest list, and the various suppliers involved in organizing the party. Additionally, invoices generated for the party should be recorded.
Clients:
Client ID
Name
Address
Contact Details
Budget
Client details including their name, address, contact information, and allocated budget should be stored for each party.
Guests:
Guest ID
Name
Address
Contact Details
The system…
arrow_forward
Create an ERD based on the Crow's Foot notation, using the following requirements:-
Scenic Tours LLC (STLLC) provides guided tours to groups of visitors to the Washington D.C. area. In
recent years, STLLC has grown quickly and is having difficulty keeping up with all of the various
information needs of the company. The company's operations are as follows.
STLLC offers many different tours. For each tour, the tour name, approximate length (in hours), and
fee charged is needed. Guides are identified by an employee ID, but the system should also record a
guide's name, home address, and date of hire. Guides take a test to be qualified to lead specific
tours. It is important to know which guides are qualified to lead which tours and the date that they
completed the qualification test for each tour. A guide may be qualified to lead many different tours.
A tour can have many different qualified guides. New guides may or may not be qualified to lead any
tours, just as a new tour may or may not…
arrow_forward
Fill out the information related to penetration testing/ethical hacking. Provide at least one example
of a tool for each task.
Task
Tool
Tool URL'
os Compatibility"
Footprinting
ww An
Scanning and enumeration
Social Engineering
SQL Injection
Vulnerability Assessment
Jailbreaking/Rooting
Password cracking
* Write down the URL of the tool's official website.
** List the operating systems (and versions) that are compatible with each tool.
arrow_forward
Please can you make the explanation as well-written and thoughtful as possible.
arrow_forward
warning ::Solve only if you can, dont copy paste. i will report your account.correct answer will get 4 likes from me.
Solve only id you are seeing this question before 5:30 pm (15/06/2021) deadline for assignment submission.if you rejected this question ,then i will report your account to bartleby! so,if you dont no the answer then simply skip. do not reject.SUB: DATABASEYou have been coaching athletics at the Hillside College club for the past year. The yearly club championship is upcoming and you were asked to assist with the design of a database for the championship. The organizing committee of the championship provided you with the following information regarding the athletics championship:
Each member of the club is uniquely identified by their ID number.
The name and email address of each member must also be stored.
Each member can be trained by only one coach.
A member is not allowed to register for the championship without a coach.
All coaches in the database must train at…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Submission guidelines: The assignment must be submitted by the deadline (earlier submissions are encouraged) in PDF format through Blackboard using the following file name format: LastName_FirstName_Assignment_1.pdf. The assignment must be typewritten. All the assignments in this course are individual work; any overlap between assignment reports will be penalized. A bank requires for their customers to access their online banking accounts to provide as User Id (or user name) the last 8 digits of their bank card number, and a password with a length between 8 and 12 ASCII characters, including the following restrictions (posted on their website): Passwords must have at least 8 characters long and at most 12 characters long, and must include at least one character from each of the following four character types: Upper case letters ABC DEF Lower case letters ghijkl Numbers 1 2 345 67890 Special characters ! @ # $ % ^ & * (+) = - The remaining characters of the password must be selected…arrow_forwardApproved Yos Priority No RESERVED FOR USE BY APPROVING AUTHORITY Reference to S0SS/PEWG sion the form. Signature 20. Conside: Figure 2, it is part of a change request form. Discuss the purpose of tharrow_forwardwrite access model Only Leena can access her laptop. The website can be accessed only during work time The file is a read-only file. Only course instructors can access students' data.arrow_forward
- Create a database table that includes at least 12 columns Use VBA tools to create a user form the form should be user friendly and interact with at least three other forms, It should allow the user to add a new complete information to the database and edit a current information available in the database. The user should be restricted to add any duplicated informatioarrow_forwardCopyright notice: This question is part of a graded exam and cannot be redistributed in any form or fashion. ID: 10-52-01- 5012. This copyright notice does not impact the contents of the question or answer choices. Hosting this question on any website or service constitutes as an academic integrity violation and is an infringement of copyright. Selena Gomezz has ventured into e-commerce and her website has a lot of products - so many that her employees are having a hard time learning about all of the products that they sell which has led to some struggles with providing excellent customer service. What would you recommend to Selena to help with this issue? Choose the best answer from the options that are available below. O Cloud based enterprise system Customer relationship management system Knowledge management system None of the options are correct O Supply chain management system 0.2 pts Question 40 Copyright notice: This question is part of a graded exam and cannot be redistributed…arrow_forwardIndicate the changes you need to make to the KimTay Pet Supplies database to support the following additional requirement. Each location has a manager who is identified by a manager ID, a manager first name, and a manager last name.arrow_forward
- Font Paragraph Styles Editing Dictate Editor Reuse aste Files Styles Voice Sensitivity Editor Reuse Files oboard You have just been hired as a consultant for a big Health Care provider. Impressed by your background in databases, they want you to completely redesign their database system. Talking with the people at the HC provider, you get the following information (be very careful on some of these attributes, and apply everything you have learned to this point: - The database contains information about patients, hospitals and doctors. - Each patient has an ID, first name, last name, address and age. A patient is uniquely identified by his or her ID. - Each hospital has an id, name and budget. The id uniquely identifies a hospital. - Each doctor an id, a full name, email address and a favorite movie. The id uniquely identifies a doctor. - Each patient can be treated at many hospitals, a hospital can treat many patients. Each doctor can work at only one hospital. A hospital can have many…arrow_forwardIn four to five sentences, Discuss CYBERSEX. Note: [Please refrain from copying on Google, most bartleby Expert copied their answer on Google]arrow_forwardPlease define the terms "integrity" and "authorization."arrow_forward
- List data excluded from the Security Rule.arrow_forwardWorkers: Name Worker ID Department Job Title Basic Salary Age Date of Birth Passport Details The system should store details of each worker including their personal information, job-related details, and passport information for identification purposes. Parties: Party ID Type Theme Date Time Duration Venue Address Client ID Guest List Catering Company Cleaning Company Decorations Company Entertainment Company Furniture Supply Company Invoice Each party should have a unique identifier along with details such as type, theme, date, time, and duration. It should also track the venue address, client details, guest list, and the various suppliers involved in organizing the party. Additionally, invoices generated for the party should be recorded. Clients: Client ID Name Address Contact Details Budget Client details including their name, address, contact information, and allocated budget should be stored for each party. Guests: Guest ID Name Address Contact Details The system…arrow_forwardCreate an ERD based on the Crow's Foot notation, using the following requirements:- Scenic Tours LLC (STLLC) provides guided tours to groups of visitors to the Washington D.C. area. In recent years, STLLC has grown quickly and is having difficulty keeping up with all of the various information needs of the company. The company's operations are as follows. STLLC offers many different tours. For each tour, the tour name, approximate length (in hours), and fee charged is needed. Guides are identified by an employee ID, but the system should also record a guide's name, home address, and date of hire. Guides take a test to be qualified to lead specific tours. It is important to know which guides are qualified to lead which tours and the date that they completed the qualification test for each tour. A guide may be qualified to lead many different tours. A tour can have many different qualified guides. New guides may or may not be qualified to lead any tours, just as a new tour may or may not…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning